We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
SCARD D2.3 DPA Proof Logic Styles - Technical Report
Popp T., Mangard S., Aigner M.
SCARD D6.1 Final Report Modeling & Simulation of SCA Effects
Trifiletti A., Popp T., Aigner M., Mangard S., Batina L.
SCARD D2.4 Final Report Logic & Cell Library Development
Aigner M., Popp T., Mangard S.
Side-Channel Leakage of Masked CMOS Gates
Mangard S., Popp T., Gammel B.
Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, 2005 Cryptographers' Track at the RSA Conference, 351-365, (Lecture Notes in Computer Science (LNCS))
Successfully Attacking Masked AES Hardware Implementations
Mangard S., Pramstaller N., Oswald M.
Cryptographic Hardware and Embedded Systems - CHES 2005, CHES, 157-171, (Lecture Notes in Computer Science (LNCS))
A Side-Channel Analysis Resistant Description of the AES S-box
Oswald M., Mangard S., Pramstaller N., Rijmen V.
Fast Software Encryption, 2005 Fast Software Encryption Workshop, 413-423, (Lecture Notes in Computer Science)
Efficient AES Implementations on ASICs and FPGAs
Pramstaller N., Mangard S., Dominikus S., Wolkerstorfer J.
Proceedings of Fourth Conference on the Advanced Encryption Standard AES4, Springer, 98-112, (Lecture Notes in Computer Science)
Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints
Popp T., Mangard S.
Cryptographic Hardware and Embedded Systems - CHES 2005, CHES, 172-186, (Lecture Notes in Computer Science (LNCS))
Traffic Classification using Self-Organizing Maps
Payer U., Lamberger M., Teufl P.
Proceedings of the Fifth International Network Conference, INC 2005 Fifth International Networking Conference Workshops, International Network Conference, 11-18
Massive Data Mining for Polymorphic Code Detection
Payer U., Teufl P., Kraxberger S., Lamberger M.
Computer Network Security, 3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 448-453, (Lecture notes im computer science)
Hybrid Engine for Polymorphic Code Detection
Payer U., Teufl P., Lamberger M.
Detection of intrusions and malware, and vulnerability assessment, Conference on Detection of Intrusions & Malware, and Vulnerability Assessment, 19-31, (Lecture notes im computer science)
Diagnosis is Repair
Staber S., Jobstmann B., Bloem R.
16th International Workshop on Principles of Diagnosis, International Workshop on Principles of Diagnosis, 169-174
Program Repair as a Game
Jobstmann B., Griesmayer A., Bloem R.
Computer Aided Verification, International Conference on Computer Aided Verification, 226-238, (LNCS)
Repair of boolean programs using games
Griesmayer A., Bloem R.
Games in Design and Verification, Games in Design and Verification, ?-?
Finding and Fixing Faults
Staber S., Jobstmann B., Bloem R.
Correct Hardware Design and Verification Methods, Advanced Research Working Conference on Correct Hardware Design and Verification Methods, 35-49, (Lecture notes in computer science)
Identifikationsmodell der österreichischen Bürgerkarte
Leitold H., Roessler T.
D-A-CH, D-A-CH Security Conference, 121-129
Identifying Obstacles in moving towards an Interoperable Electronic Identity Management System
Leitold H., Posch R., Hayat A.
Proceedings of eGOV INTEROP'05, International Conference on Interoperability of eGovernment Services
C(I)IP Aktivitäten in Österreich
Leitold H., Posch R.
Preprints of CIP Europe 2005, CIP Europe 2005, 50-60
E-Voting: A Scalable Approach using XML and Hardware Security Modules
Leitold H., Posch R., Roessler T.
Proceedings of eee2005, IEEE International Conference on e-Technology, e-Commerce and e-Service 2005 (eee2005), 480-485
Interoperable Certification Authorities in the European Union - A Practical Solution
Hayat A., Rechberger C.
EGOV05 - International Conference on E-Government, 374-381